Vulnerability Description
CoreDNS is a DNS server that chains plugins. Prior to version 1.14.0, multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or crash the server by opening many concurrent connections, streams, or sending oversized request bodies. The issue is similar in nature to CVE-2025-47950 (QUIC DoS) but affects additional server types that do not enforce connection limits, stream limits, or message size constraints. Version 1.14.0 contains a patch.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Coredns.Io | Coredns | < 1.14.0 |
Related Weaknesses (CWE)
References
- https://github.com/coredns/coredns/commit/0d8cbb1a6bcb6bc9c1a489865278b8725fa208Patch
- https://github.com/coredns/coredns/pull/7490Issue TrackingPatch
- https://github.com/coredns/coredns/security/advisories/GHSA-527x-5wrf-22m2Third Party Advisory
FAQ
What is CVE-2025-68151?
CVE-2025-68151 is a vulnerability with a CVSS score of 7.5 (HIGH). CoreDNS is a DNS server that chains plugins. Prior to version 1.14.0, multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated rem...
How severe is CVE-2025-68151?
CVE-2025-68151 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-68151?
Check the references section above for vendor advisories and patch information. Affected products include: Coredns.Io Coredns.